General
-
Target
JaffaCakes118_554b79169d795886f81435e3eaba02d6
-
Size
125KB
-
Sample
250129-lgpjbstqft
-
MD5
554b79169d795886f81435e3eaba02d6
-
SHA1
105be60749a8caab29764598b1f9aa49a1c4447c
-
SHA256
81809552344b4bdf2e456d42e66fa5403e597d8143a8ef69c27bbc49d1b428b7
-
SHA512
c8f2b3c646d29310693fe9a63ed192be22f47e3c1da3615d600e607db4a21d80006ec56979f9ac095073af62dc9baa92681ccad6c0bc364218c668754b3ac7c4
-
SSDEEP
3072:QMYjUtQl78T/zoutQhfeFuAcxb+IgCU3REsm8Bld:6jU2F8bzoSQRe5C2Esm8R
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_554b79169d795886f81435e3eaba02d6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_554b79169d795886f81435e3eaba02d6.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
JaffaCakes118_554b79169d795886f81435e3eaba02d6
-
Size
125KB
-
MD5
554b79169d795886f81435e3eaba02d6
-
SHA1
105be60749a8caab29764598b1f9aa49a1c4447c
-
SHA256
81809552344b4bdf2e456d42e66fa5403e597d8143a8ef69c27bbc49d1b428b7
-
SHA512
c8f2b3c646d29310693fe9a63ed192be22f47e3c1da3615d600e607db4a21d80006ec56979f9ac095073af62dc9baa92681ccad6c0bc364218c668754b3ac7c4
-
SSDEEP
3072:QMYjUtQl78T/zoutQhfeFuAcxb+IgCU3REsm8Bld:6jU2F8bzoSQRe5C2Esm8R
-
Modifies WinLogon for persistence
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
10